This paper proposes fault tolerant algorithms for routing mobile agents in a single channel wireless sensor network which cover every node in the network. These algorithms use local knowledge (assume no knowledge of g...This paper proposes fault tolerant algorithms for routing mobile agents in a single channel wireless sensor network which cover every node in the network. These algorithms use local knowledge (assume no knowledge of global deployment or topology, etc). We propose the algorithms and show mathematical analysis to support our claims. The paper ends with simulation studies and discussion of results.展开更多
In mobile cloud computing,trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud.Aiming at the security and trust management...In mobile cloud computing,trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud.Aiming at the security and trust management of mobile agent system in mobile cloud computing environment,the Human Trust Mechanism(HTM)is used to study the subjective trust formation,trust propagation and trust evolution law,and the subjective trust dynamic management algorithm(MASTM)is proposed.Based on the interaction experience between the mobile agent and the execution host and the third-party recommendation information to collect the basic trust data,the public trust host selection algorithm is given.The isolated malicious host algorithm and the integrated trust degree calculation algorithm realize the function of selecting the trusted cluster and isolating the malicious host,so as to enhance the security interaction between the mobile agent and the host.Given algorithm simulation and verification were carried out to prove its feasibility and effectiveness.展开更多
In networked mobile commerce network transactions,trust is the prerequisite and key to a smooth transaction.The measurement of trust between entities involves factors such as transaction amount,transaction time,person...In networked mobile commerce network transactions,trust is the prerequisite and key to a smooth transaction.The measurement of trust between entities involves factors such as transaction amount,transaction time,personal income of consumer entities and their risk attitude towards trust,etc.,so it is difficult to accurately calculate quantitatively.In order to find out the essential characteristics of this trust relationship,based on the research background of mobile commerce in the mobile network environment,a dynamic trust mechanism is proposed through the research of trust in the mobile network environment,trust influencing factors and trust mechanism.The calculation model of mobile interactive services based on mobile service business transactions.The model calculates feedback credibility through feedback deviation and feedback robustness,and combines transaction context factors and trust mapping mechanism to judge the seller’s credibility.This model better reflects the degree of influence of subjective factors such as personal preferences and risk attitudes on trust calculations,And the sensitivity of trust algorithms and transaction attributes has been greatly improved.After a large number of experiments and theoretical analysis,this mechanism provides an effective explanation for solving the problem of network trust computing.and provides valuable new ideas for the study of secure transactions in the mobile Internet environment.展开更多
Mobile Agent has many benefits over traditional distributed systems such as reducing latency,bandwidth,and costs.Mobile Agent Systems are not fully utilized due to security problems.This paper focuses on mobile agent ...Mobile Agent has many benefits over traditional distributed systems such as reducing latency,bandwidth,and costs.Mobile Agent Systems are not fully utilized due to security problems.This paper focuses on mobile agent protection against malicious hosts.A new security mechanism called Checkpoints has been proposed.Checkpoint Mechanism(CPM)aims to protect Mobile Agent against malicious hosts in case of Capturing and Integrity attacks.CPM assumes using a free-roaming mobility mechanism by Mobile agent systems.The main idea behind CPM is to generate multiple versions of Mobile Agent.The multiple version is used to recover Mobile Agent from Capturing and Integrity attacks by untrusted hosts.MA versions are kept in Recovery Host(RH).RH plays a key role in CPM by controlling and monitoring MAs’recovery processes.A prototype method has been used to prove the feasibility of CPM.The p https://dsr.kau.edu.sa/Default-305-ARrototype was implemented by using the.Net framework and C#.full discussion for several scenarios has been done to analyze the feasibility and performance for CPM.As found from this research,CPM has a strong ability to protect Mobile Agents from Capturing and Integrity attacks completely.In addition,there is no negative impact on the overall performance of the mobile agent system.展开更多
With the continuous use of cloud and distributed computing, the threats associated with data and information technology (IT) in such an environment have also increased. Thus, data security and data leakage prevention ...With the continuous use of cloud and distributed computing, the threats associated with data and information technology (IT) in such an environment have also increased. Thus, data security and data leakage prevention have become important in a distributed environment. In this aspect, mobile agent-based systems are one of the latest mechanisms to identify and prevent the intrusion and leakage of the data across the network. Thus, to tackle one or more of the several challenges on Mobile Agent-Based Information Leakage Prevention, this paper aim at providing a comprehensive, detailed, and systematic study of the Distribution Model for Mobile Agent-Based Information Leakage Prevention. This paper involves the review of papers selected from the journals which are published in 2009 and 2019. The critical review is presented for the distributed mobile agent-based intrusion detection systems in terms of their design analysis, techniques, and shortcomings. Initially, eighty-five papers were identified, but a paper selection process reduced the number of papers to thirteen important reviews.展开更多
The extensive access of network interaction has made present networks more responsive to earlier intrusions. In distributed network intrusions, there are many computing nodes that are assisted by intruders. The eviden...The extensive access of network interaction has made present networks more responsive to earlier intrusions. In distributed network intrusions, there are many computing nodes that are assisted by intruders. The evidence of intrusions is to be associated from all the held up nodes. From the last few years, mobile agent based technique in intrusion detection system (IDS) has been widely used to detect intrusion over distributed network. This paper presented survey of several existing mobile agent based intrusion detection system and comparative analysis report between them. Furthermore we have focused on each attribute of analysis, for example technique (NIDS, HIDS or Hybrid), behavior layer, detection techniques for analysis, uses of mobile agent and technology used by existing IDS, strength and issues. Their strengths and issues are situational wherever appropriate. We have observed that some of the existing techniques are used in IDS which causes low detection rate, behavior layers like TCP connection for packet capturing which is most important activity in NIDS and response time (technology execution time) with memory consumption by mobile agent as major issues.展开更多
Nowadays, mobile agents are an effective paradigm for accessing the information in distributed applications, especially in a dynamic network environment such as Internet businesses. In such kind of Internet based appl...Nowadays, mobile agents are an effective paradigm for accessing the information in distributed applications, especially in a dynamic network environment such as Internet businesses. In such kind of Internet based applications, access must be secure and authentication takes a vital role to avoid malicious use of the system. This kind of security has been provided by several previously proposed algorithms based on RSA digital signature cryptography. However, the computational time for performing encryption and decryption operations in the past literatures is very high. In this paper, we propose an anonymous authentication scheme which potentially reduces the overall computation time needed for verifying the legitimacy of the users. Comparing with previous anonymous authentication schemes, our proposed scheme provides more security and it is effective in terms of computation cost. The experimental results show that the proposed method authenticates the users with low computational time significantly.展开更多
Relative measurements are exploited to cooperatively detect and recover faults in the positioning of Mobile Agent(MA)Swarms(MASs).First,a network vertex fault detection method based on edge testing is proposed.For eac...Relative measurements are exploited to cooperatively detect and recover faults in the positioning of Mobile Agent(MA)Swarms(MASs).First,a network vertex fault detection method based on edge testing is proposed.For each edge,a property that has a functional relationship with the properties of its two vertices is measured and tested.Based on the edge testing results of the network,the maximum likelihood principle is used to identify the vertex fault sources.Second,an edge distance testing method based on the noncentral chi-square distribution is developed for detecting faults in the Global Navigation Satellite System(GNSS)positioning of MASs.Third,a recovery strategy for faults in the positioning of MASs based on distance measurement is provided.The effectiveness of the proposed methods is validated by a simulation case in which an MAS passes through a GNSS spoofing zone.The proposed methods are conducive to increasing the robustness of the positioning of MASs in complex environments.The main novelties include the following:(A)network vertex fault detection is based on concrete probability analysis rather than simple majority voting,and(B)the relation of detectability and recoverability of MAS positioning faults with the structure of the relative measurement network is first disclosed.展开更多
The security issues of mobile agent system have embarrassed its widespread implementation. The paper analyses communication security threats and countermeasures of mobile agent system and proposes a communication secu...The security issues of mobile agent system have embarrassed its widespread implementation. The paper analyses communication security threats and countermeasures of mobile agent system and proposes a communication security protocol of mobile agent system. It provides multifactor authentication, encryption transmission, and integrity protection of mobile agent.展开更多
We investigate the issue of synchronizing a blinking coupling mobile agent network through a blinking adaptation strategy,where each agent with blinking wave emission behavior not only adjusts its blinking period acco...We investigate the issue of synchronizing a blinking coupling mobile agent network through a blinking adaptation strategy,where each agent with blinking wave emission behavior not only adjusts its blinking period according to the local property of its neighbors,but also coordinates its blinking phase with those of neighboring agents.In leading the agents to blink orderly with a blinking period commensurate with the characteristic time of the dynamical oscillator,the presented blinking adaptation strategy works effectively in guaranteeing the synchronous motion of the considered network when the power density is large.In addition,the influence of the controlling parameter and moving velocity on network evolution is studied by assessing the convergence time.展开更多
Purpose-The success of web services involved the adoption of this technology by different service providers through the web,which increased the number of web services,as a result making their discovery a tedious task....Purpose-The success of web services involved the adoption of this technology by different service providers through the web,which increased the number of web services,as a result making their discovery a tedious task.The UDDI standard has been proposed for web service publication and discovery.However,it lacks sufficient semantic description in the content of web services,which makes it difficult to find and compose suitable web services during the analysis,search,and matching processes.In addition,few works on semantic web services discovery take into account the user’s profile.The purpose of this paper is to optimize the web services discovery by reducing the search space and increasing the number of relevant services.Design/methodology/approach-The authors propose a new approach for the semantic web services discovery based on the mobile agent,user profile and metadata catalog.In the approach,each user can be described by a profile which is represented in two dimensions:personal dimension and preferences dimension.The description of web service is based on two levels:metadata catalog and WSDL.Findings-First,the semantic web services discovery reduces the number of relevant services through the application of matching algorithm“semantic match”.The result of this first matching restricts the search space at the level of UDDI registry,which allows the users to have good results for the“functional match”.Second,the use of mobile agents as a communication entity reduces the traffic on the network and the quantity of exchanged information.Finally,the integration of user profile in the service discovery process facilitates the expression of the user needs and makes intelligible the selected service.Originality/value-To the best knowledge of the authors,this is the first attempt at implementing the mobile agent technology with the semantic web service technology.展开更多
In wireless sensor networks,data fusion(in-network processing)is a critical issue because sensor networks are energy-constrained and bandwidth-constrained.Recently,a new scheme based on mobile agent has been proposed ...In wireless sensor networks,data fusion(in-network processing)is a critical issue because sensor networks are energy-constrained and bandwidth-constrained.Recently,a new scheme based on mobile agent has been proposed to solve the problem.The order and number of nodes on the route traversed by a mobile agent determine the energy consumption,and hence,they have a significant impact on the overall performance of the whole system.Considering the limited transmission range of sensor nodes,we showed that this routing problem in a multi-hop cluster could be modeled as a node-weighted traveling tourist problem(TTP).We proved that the problem was nondeterministic polynomial time(NP)-complete.Then we presented a new approximation algorithm to solve the problem.Simulation experiments demonstrate that the proposed heuristic is more energy-efficient than the two earlier ones.展开更多
As a new technology,mobile agent(MA)shows a wide application in the field of network technology.However,security has been one of the crucial problems in its application.A new protection model based on a trusted elemen...As a new technology,mobile agent(MA)shows a wide application in the field of network technology.However,security has been one of the crucial problems in its application.A new protection model based on a trusted element is presented in this paper.The trusted element,which differs from the traditional trusted hardware such as a smart card or a co-processor,offers a third party service based on an encrypted circuit construction.The procedure of constructing an encrypted circuit is introduced and the method of using the trusted service to protect the MA is also described.An application example is given to show how to use the new model at the end of the paper.展开更多
Synchronization is a process that describes the coherent dynamics of a large ensemble of interacting units.The study of explosive synchronization transition attracts considerable attention.Here,I report the explosive ...Synchronization is a process that describes the coherent dynamics of a large ensemble of interacting units.The study of explosive synchronization transition attracts considerable attention.Here,I report the explosive transition within the framework of a mobile network,while each oscillator is controlled by global-order parameters of the system.Using numerical simulation,I find that the explosive synchronization(ES)transition behavior can be controlled by simply adjusting the fraction of controlled oscillators.The influences of some parameters on explosive synchronization are studied.Moreover,due to the presence of the positive feedback mechanism,I prevent the occurrence of the synchronization of continuous-phase transition and make phase transition of the system a first-order phase transition accompanied by a hysteresis loop.展开更多
This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in wireless mesh networks.In this approach,the immunity-based agents m...This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in wireless mesh networks.In this approach,the immunity-based agents monitor the situation in the network.These agents can take appropriate actions according to the underlying security policies.Specifically,their activities are coordinated in a hierarchical fashion while sensing,communicating,determining and generating responses.Such an agent can learn about and adapt to its environment dynamically and can detect both known and unknown intrusions.The proposed intrusion detection architecture is designed to be flexible,extendible,and adaptable so that it can perform real-time monitoring.This paper provides the conceptual view and a general framework of the proposed system.In the end,the architecture is illustrated by an example and by simulation to show it can prevent attacks efficiently.展开更多
Choosing the best way for describing physical reality has always been standing in focus of research.Several methodologies have been developed based on classical mathematics,or statistics and also new disciplines-such ...Choosing the best way for describing physical reality has always been standing in focus of research.Several methodologies have been developed based on classical mathematics,or statistics and also new disciplines-such as soft-computing techniques-appeared.Petri Nets as one of the most naturalistic modeling methodologies are well suited to describe complex process in general.However in some fields of modeling the describing power of basic Petri Nets proved not to be robust enough,therefore several exten-sions were made to the original concept.Colored tokens(Colored Petri Nets),stochastic delayed streaming of mobile entities(Stochastic Petri Nets),object oriented architecture(Object Oriented Petri Nets),numerical(Numerical Petri Nets)and linguistic attributes(Fuzzy Petri Nets)broaden the range of capabilities.In some fields of problem solv-ing,usage of static and mobile knowledge bases is needed:e.g.,flexible manufacturing systems,or intelligent traffic simulation.These problems to be investigated involved new conceptual developments of Petri Nets and led to the introduction of Knowledge Attributed Petri Nets.At the same time distributed control in simulation appeared,intelligent agents supported the connection of mobile knowledge bases and static infer-ence engines in an effective way.The mentioned extensions brought general support in model synthesis,but some unsolved questions remained related to the implementation of intelligent mobile entities.This paper highlights a new level of AI controlled simulation introducing the Extended Knowledge Attributed Petri Nets that offer the capability of easy implementation of mobile inference engines and knowledge base,providing general mobile AI in Petri Nets.展开更多
文摘This paper proposes fault tolerant algorithms for routing mobile agents in a single channel wireless sensor network which cover every node in the network. These algorithms use local knowledge (assume no knowledge of global deployment or topology, etc). We propose the algorithms and show mathematical analysis to support our claims. The paper ends with simulation studies and discussion of results.
基金This work was supported by the National Natural Science Foundation of China(61772196,61472136)the Hunan Provincial Focus Social Science Fund(2016ZDB006)+2 种基金Hunan Provincial Social Science Achievement Review Committee results appraisal identification project(Xiang social assessment 2016JD05)Key Project of Hunan Provincial Social Science Achievement Review Committee(XSP 19ZD1005)The authors gratefully acknowledge the financial support provided by the Key Laboratory of Hunan Province for New Retail Virtual Reality Technology(2017TP1026).
文摘In mobile cloud computing,trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud.Aiming at the security and trust management of mobile agent system in mobile cloud computing environment,the Human Trust Mechanism(HTM)is used to study the subjective trust formation,trust propagation and trust evolution law,and the subjective trust dynamic management algorithm(MASTM)is proposed.Based on the interaction experience between the mobile agent and the execution host and the third-party recommendation information to collect the basic trust data,the public trust host selection algorithm is given.The isolated malicious host algorithm and the integrated trust degree calculation algorithm realize the function of selecting the trusted cluster and isolating the malicious host,so as to enhance the security interaction between the mobile agent and the host.Given algorithm simulation and verification were carried out to prove its feasibility and effectiveness.
基金The author is very grateful for the financial support of the new retail virtual reality technology(2017TP1026)of the key laboratory in Hunan Province.
文摘In networked mobile commerce network transactions,trust is the prerequisite and key to a smooth transaction.The measurement of trust between entities involves factors such as transaction amount,transaction time,personal income of consumer entities and their risk attitude towards trust,etc.,so it is difficult to accurately calculate quantitatively.In order to find out the essential characteristics of this trust relationship,based on the research background of mobile commerce in the mobile network environment,a dynamic trust mechanism is proposed through the research of trust in the mobile network environment,trust influencing factors and trust mechanism.The calculation model of mobile interactive services based on mobile service business transactions.The model calculates feedback credibility through feedback deviation and feedback robustness,and combines transaction context factors and trust mapping mechanism to judge the seller’s credibility.This model better reflects the degree of influence of subjective factors such as personal preferences and risk attitudes on trust calculations,And the sensitivity of trust algorithms and transaction attributes has been greatly improved.After a large number of experiments and theoretical analysis,this mechanism provides an effective explanation for solving the problem of network trust computing.and provides valuable new ideas for the study of secure transactions in the mobile Internet environment.
基金This project funded by the Deanship of Scientific Research(DSR),King Abdulaziz University,Jeddah,under Grant No.D-152-611-1441.
文摘Mobile Agent has many benefits over traditional distributed systems such as reducing latency,bandwidth,and costs.Mobile Agent Systems are not fully utilized due to security problems.This paper focuses on mobile agent protection against malicious hosts.A new security mechanism called Checkpoints has been proposed.Checkpoint Mechanism(CPM)aims to protect Mobile Agent against malicious hosts in case of Capturing and Integrity attacks.CPM assumes using a free-roaming mobility mechanism by Mobile agent systems.The main idea behind CPM is to generate multiple versions of Mobile Agent.The multiple version is used to recover Mobile Agent from Capturing and Integrity attacks by untrusted hosts.MA versions are kept in Recovery Host(RH).RH plays a key role in CPM by controlling and monitoring MAs’recovery processes.A prototype method has been used to prove the feasibility of CPM.The p https://dsr.kau.edu.sa/Default-305-ARrototype was implemented by using the.Net framework and C#.full discussion for several scenarios has been done to analyze the feasibility and performance for CPM.As found from this research,CPM has a strong ability to protect Mobile Agents from Capturing and Integrity attacks completely.In addition,there is no negative impact on the overall performance of the mobile agent system.
文摘With the continuous use of cloud and distributed computing, the threats associated with data and information technology (IT) in such an environment have also increased. Thus, data security and data leakage prevention have become important in a distributed environment. In this aspect, mobile agent-based systems are one of the latest mechanisms to identify and prevent the intrusion and leakage of the data across the network. Thus, to tackle one or more of the several challenges on Mobile Agent-Based Information Leakage Prevention, this paper aim at providing a comprehensive, detailed, and systematic study of the Distribution Model for Mobile Agent-Based Information Leakage Prevention. This paper involves the review of papers selected from the journals which are published in 2009 and 2019. The critical review is presented for the distributed mobile agent-based intrusion detection systems in terms of their design analysis, techniques, and shortcomings. Initially, eighty-five papers were identified, but a paper selection process reduced the number of papers to thirteen important reviews.
文摘The extensive access of network interaction has made present networks more responsive to earlier intrusions. In distributed network intrusions, there are many computing nodes that are assisted by intruders. The evidence of intrusions is to be associated from all the held up nodes. From the last few years, mobile agent based technique in intrusion detection system (IDS) has been widely used to detect intrusion over distributed network. This paper presented survey of several existing mobile agent based intrusion detection system and comparative analysis report between them. Furthermore we have focused on each attribute of analysis, for example technique (NIDS, HIDS or Hybrid), behavior layer, detection techniques for analysis, uses of mobile agent and technology used by existing IDS, strength and issues. Their strengths and issues are situational wherever appropriate. We have observed that some of the existing techniques are used in IDS which causes low detection rate, behavior layers like TCP connection for packet capturing which is most important activity in NIDS and response time (technology execution time) with memory consumption by mobile agent as major issues.
文摘Nowadays, mobile agents are an effective paradigm for accessing the information in distributed applications, especially in a dynamic network environment such as Internet businesses. In such kind of Internet based applications, access must be secure and authentication takes a vital role to avoid malicious use of the system. This kind of security has been provided by several previously proposed algorithms based on RSA digital signature cryptography. However, the computational time for performing encryption and decryption operations in the past literatures is very high. In this paper, we propose an anonymous authentication scheme which potentially reduces the overall computation time needed for verifying the legitimacy of the users. Comparing with previous anonymous authentication schemes, our proposed scheme provides more security and it is effective in terms of computation cost. The experimental results show that the proposed method authenticates the users with low computational time significantly.
基金supported by the National Natural Science Foundation of China(Nos.62073343 and 62003372)。
文摘Relative measurements are exploited to cooperatively detect and recover faults in the positioning of Mobile Agent(MA)Swarms(MASs).First,a network vertex fault detection method based on edge testing is proposed.For each edge,a property that has a functional relationship with the properties of its two vertices is measured and tested.Based on the edge testing results of the network,the maximum likelihood principle is used to identify the vertex fault sources.Second,an edge distance testing method based on the noncentral chi-square distribution is developed for detecting faults in the Global Navigation Satellite System(GNSS)positioning of MASs.Third,a recovery strategy for faults in the positioning of MASs based on distance measurement is provided.The effectiveness of the proposed methods is validated by a simulation case in which an MAS passes through a GNSS spoofing zone.The proposed methods are conducive to increasing the robustness of the positioning of MASs in complex environments.The main novelties include the following:(A)network vertex fault detection is based on concrete probability analysis rather than simple majority voting,and(B)the relation of detectability and recoverability of MAS positioning faults with the structure of the relative measurement network is first disclosed.
基金Supported by the National Natural Science Foundation of China (60673071)
文摘The security issues of mobile agent system have embarrassed its widespread implementation. The paper analyses communication security threats and countermeasures of mobile agent system and proposes a communication security protocol of mobile agent system. It provides multifactor authentication, encryption transmission, and integrity protection of mobile agent.
基金supported by the National Natural Science Foundation of China (Nos.60736021,61004106,and U0735003)the National High-Tech R & D Program (863) of China (No. 2009AA04Z154)
文摘We investigate the issue of synchronizing a blinking coupling mobile agent network through a blinking adaptation strategy,where each agent with blinking wave emission behavior not only adjusts its blinking period according to the local property of its neighbors,but also coordinates its blinking phase with those of neighboring agents.In leading the agents to blink orderly with a blinking period commensurate with the characteristic time of the dynamical oscillator,the presented blinking adaptation strategy works effectively in guaranteeing the synchronous motion of the considered network when the power density is large.In addition,the influence of the controlling parameter and moving velocity on network evolution is studied by assessing the convergence time.
文摘Purpose-The success of web services involved the adoption of this technology by different service providers through the web,which increased the number of web services,as a result making their discovery a tedious task.The UDDI standard has been proposed for web service publication and discovery.However,it lacks sufficient semantic description in the content of web services,which makes it difficult to find and compose suitable web services during the analysis,search,and matching processes.In addition,few works on semantic web services discovery take into account the user’s profile.The purpose of this paper is to optimize the web services discovery by reducing the search space and increasing the number of relevant services.Design/methodology/approach-The authors propose a new approach for the semantic web services discovery based on the mobile agent,user profile and metadata catalog.In the approach,each user can be described by a profile which is represented in two dimensions:personal dimension and preferences dimension.The description of web service is based on two levels:metadata catalog and WSDL.Findings-First,the semantic web services discovery reduces the number of relevant services through the application of matching algorithm“semantic match”.The result of this first matching restricts the search space at the level of UDDI registry,which allows the users to have good results for the“functional match”.Second,the use of mobile agents as a communication entity reduces the traffic on the network and the quantity of exchanged information.Finally,the integration of user profile in the service discovery process facilitates the expression of the user needs and makes intelligible the selected service.Originality/value-To the best knowledge of the authors,this is the first attempt at implementing the mobile agent technology with the semantic web service technology.
基金supported by the National Natural Science Foundation of China(Grant No.60372076).
文摘In wireless sensor networks,data fusion(in-network processing)is a critical issue because sensor networks are energy-constrained and bandwidth-constrained.Recently,a new scheme based on mobile agent has been proposed to solve the problem.The order and number of nodes on the route traversed by a mobile agent determine the energy consumption,and hence,they have a significant impact on the overall performance of the whole system.Considering the limited transmission range of sensor nodes,we showed that this routing problem in a multi-hop cluster could be modeled as a node-weighted traveling tourist problem(TTP).We proved that the problem was nondeterministic polynomial time(NP)-complete.Then we presented a new approximation algorithm to solve the problem.Simulation experiments demonstrate that the proposed heuristic is more energy-efficient than the two earlier ones.
基金supported by the National Natural Science Foundation of China(60573141,70271050)the Hi-Tech Research and Development Program of China(2005AA775050)+5 种基金the Natural Science Foundation of Jiangsu Province(BK2005146)the High Technology Research Program of Jiangsu Province(BG2004004,BG2005038,BG2005038,BG2006001)the Key Laboratory of Information Technology Processing of Jiangsu Province(kjs05001,kjs0606)the High Technology Research Program of Nanjing City(2006Software Foundation105)the State Key Laboratory of Modern Communication(9140C1101010603)Jiangsu Provincial Research Scheme of Natural Science for Higher Education Institutions(05KJB520092).
文摘As a new technology,mobile agent(MA)shows a wide application in the field of network technology.However,security has been one of the crucial problems in its application.A new protection model based on a trusted element is presented in this paper.The trusted element,which differs from the traditional trusted hardware such as a smart card or a co-processor,offers a third party service based on an encrypted circuit construction.The procedure of constructing an encrypted circuit is introduced and the method of using the trusted service to protect the MA is also described.An application example is given to show how to use the new model at the end of the paper.
基金the Natural Science Foundation of Jiangsu Province,China(Grant No.20KJB470030).
文摘Synchronization is a process that describes the coherent dynamics of a large ensemble of interacting units.The study of explosive synchronization transition attracts considerable attention.Here,I report the explosive transition within the framework of a mobile network,while each oscillator is controlled by global-order parameters of the system.Using numerical simulation,I find that the explosive synchronization(ES)transition behavior can be controlled by simply adjusting the fraction of controlled oscillators.The influences of some parameters on explosive synchronization are studied.Moreover,due to the presence of the positive feedback mechanism,I prevent the occurrence of the synchronization of continuous-phase transition and make phase transition of the system a first-order phase transition accompanied by a hysteresis loop.
基金supported by National Natural Science Foundation of China under Grant No.60932003National High Technical Research and Development Program of China(863 program) Grant No.2007AA01Z452,No.2009AA01Z118+1 种基金Shanghai Municipal Natural Science Foundation under Grant No.09ZR1414900National Undergraduate Innovative Test Program under Grant No.091024812
文摘This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in wireless mesh networks.In this approach,the immunity-based agents monitor the situation in the network.These agents can take appropriate actions according to the underlying security policies.Specifically,their activities are coordinated in a hierarchical fashion while sensing,communicating,determining and generating responses.Such an agent can learn about and adapt to its environment dynamically and can detect both known and unknown intrusions.The proposed intrusion detection architecture is designed to be flexible,extendible,and adaptable so that it can perform real-time monitoring.This paper provides the conceptual view and a general framework of the proposed system.In the end,the architecture is illustrated by an example and by simulation to show it can prevent attacks efficiently.
基金This project is supported by the grant TAMOP-4.2.2.B-10/1-2010-0009.
文摘Choosing the best way for describing physical reality has always been standing in focus of research.Several methodologies have been developed based on classical mathematics,or statistics and also new disciplines-such as soft-computing techniques-appeared.Petri Nets as one of the most naturalistic modeling methodologies are well suited to describe complex process in general.However in some fields of modeling the describing power of basic Petri Nets proved not to be robust enough,therefore several exten-sions were made to the original concept.Colored tokens(Colored Petri Nets),stochastic delayed streaming of mobile entities(Stochastic Petri Nets),object oriented architecture(Object Oriented Petri Nets),numerical(Numerical Petri Nets)and linguistic attributes(Fuzzy Petri Nets)broaden the range of capabilities.In some fields of problem solv-ing,usage of static and mobile knowledge bases is needed:e.g.,flexible manufacturing systems,or intelligent traffic simulation.These problems to be investigated involved new conceptual developments of Petri Nets and led to the introduction of Knowledge Attributed Petri Nets.At the same time distributed control in simulation appeared,intelligent agents supported the connection of mobile knowledge bases and static infer-ence engines in an effective way.The mentioned extensions brought general support in model synthesis,but some unsolved questions remained related to the implementation of intelligent mobile entities.This paper highlights a new level of AI controlled simulation introducing the Extended Knowledge Attributed Petri Nets that offer the capability of easy implementation of mobile inference engines and knowledge base,providing general mobile AI in Petri Nets.